The CrowdStrike Gov Threat Summit featured unforgettable conversations on the emerging threats targeting the government and the tactics, techniques, and technology agencies need to stop adversaries in their tracks.
Watch select on-demand videos7:30 AM - 9:00 AM
Registration, Breakfast, Networking and Demos in the
Hub
Grab your badge, coffee and breakfast while exploring the Gov Threat Summit
Hub, open throughout the day. Here you’ll find demo stations, CrowdStrike
experts, your peers, sponsor kiosks and theater lightning sessions for
conversations across: Counter-Adversary Operations & Threat Intelligence;
Zero Trust; Next Gen SIEM; Identity Protection; Compliance; Cloud Security;
AI; Exposure Management and more.
Falcon for IT: Today's IT environments are burdened with
fragmented point products and flawed tools, amplifying the workload for your
teams. Falcon for IT enables you to gain fresh asset insights and execute
comprehensive IT, security, and compliance workflows, all with a single
agent and in a unified console.
Next Gen SIEM: 7 minutes. That’s how long it takes for
an adversary to break out and move laterally in your environment. Watch this
session to find out how you stay ahead of adversaries with CrowdStrike
Next-Gen SIEM. You'll discover how you can collect logs at petabyte scale
and investigate threats quickly with blazing-fast search. Join us to see the
latest capabilities we've introduced to solve your toughest SIEM
challenges.
Cloud Security: CrowdStrike Falcon Cloud Security goes
beyond ad-hoc approaches by unifying everything you need for cloud security
in a single platform to deliver comprehensive protection from the host to
the cloud and everywhere in between.
Identity Protection: Adversaries have evolved with 8 out of
10 attacks involving stolen or compromised credentials and 112% increase in
access broker ads on the dark web. It allows them to stay under the radar
and move laterally undetected. Learn how CrowdStrike's unique approach of
combining identity and endpoint telemetry enables customers to detect these
modern identity-driven attacks and stop them in real-time.
Join one or sit in on all four Hub Lightning Sessions. For session titles and descriptions read more...
9:00 AM - 9:10 AM
Welcome & Introduction
Shawn Henry, Chief Security Officer, CrowdStrike and former
Executive
Assistant Director, FBI
9:10 AM - 9:50 AM
Generative AI, Misinformation, Disinformation and Cyber Threats for the 2024 Elections
Adam Meyers, SVP, Counter Adversary Operations, CrowdStrike
How are criminal, hacktivist and geopolitical developments changing the threat environment for upcoming elections around the globe this year? Hear from Adam Meyers, SVP, CrowdStrike Counter Adversary Operations, and founder and lead author of CrowdStrike’s annual Global Threat Report, as he shares CrowdStrike’s perspective on the ways adversaries are trying to disrupt or influence elections worldwide, how Generative AI is changing the threat landscape and recommendations for countering threats to elections.
Deep Dive with Adam Meyers and Chris Bing, Award-Winning Reuters Reporter
Chris Bing, Reporter, Thomson Reuters
Chris Bing is widely regarded as one of the security industry's most notable and plugged-in reporters, covering the intersection of technology and national security with a focus on how the evolving cybersecurity landscape affects government and business. Chris and Adam will have an exclusive discussion going deeper on Adam's findings and the role modern cybersecurity plays in protecting our nation from today's cyber adversaries.
9:50 AM - 10:25 AM
Cybersecurity Platform Consolidation in Digital
Transformation
Elia Zaitsev, Chief Technology Officer, CrowdStrike
With technology evolving at a rapid pace, cybersecurity solutions must
continue to evolve to stay ahead of adversaries and defeat threats.
CrowdStrike CTO Elia Zaitsev will discuss recent industry developments,
including enhanced focus on extended detection and response (XDR) concepts,
leveraging AI for defense and adoption of Zero Trust. Hear how federal
agencies and the defense industrial base can implement new security
capabilities to defend against the next sophisticated attack.
10:25 AM - 10:45 AM
Networking Break in the Hub
Take a quick break between sessions visit demo stations, CrowdStrike
experts, your peers, sponsors and theater lightning sessions for
conversations across: Counter-Adversary Operations & Threat Intelligence;
Zero Trust; Next Gen SIEM; Identity Protection; Compliance; Cloud Security;
AI; Exposure Management and more.
Falcon for IT: Today's IT environments are burdened with
fragmented point products and flawed tools, amplifying the workload for your
teams. Falcon for IT enables you to gain fresh asset insights and execute
comprehensive IT, security, and compliance workflows, all with a single
agent and in a unified console.
Next Gen SIEM: 7 minutes. That’s how long it takes for
an adversary to break out and move laterally in your environment. Watch this
session to find out how you stay ahead of adversaries with CrowdStrike
Next-Gen SIEM. You'll discover how you can collect logs at petabyte scale
and investigate threats quickly with blazing-fast search. Join us to see the
latest capabilities we've introduced to solve your toughest SIEM
challenges.
Cloud Security: CrowdStrike Falcon Cloud Security goes
beyond ad-hoc approaches by unifying everything you need for cloud security
in a single platform to deliver comprehensive protection from the host to
the cloud and everywhere in between.
Identity Protection: Adversaries have evolved with 8 out of
10 attacks involving stolen or compromised credentials and 112% increase in
access broker ads on the dark web. It allows them to stay under the radar
and move laterally undetected. Learn how CrowdStrike's unique approach of
combining identity and endpoint telemetry enables customers to detect these
modern identity-driven attacks and stop them in real-time.
Multiple lightning sessions will be offered in the Hub; for session titles and descriptions read more...
10:45 AM - 11:15 AM
Shared Services for Government: A Unified Approach
Michael Duffy, Associate Director, CISA
Alan Halachmi, Director, Worldwide Public Sector Solutions
Architecture, AWS
Jesse Sloman, Deputy Chief Cyber Officer for Operations, New York State
Tracey Mills, VP, Public Sector & Healthcare,
CrowdStrike
Public Sector entities at the State and Local, Federal, and International
levels are embarking on ambitious efforts to enhance visibility, foster
collaboration, and strengthen their cyber posture with a community mindset.
Join CrowdStrike’s VP of Public Sector and Healthcare Sales, Tracey Mills
for a moderated conversation on best practices implementing shared services
that help defend and protect distributed information environments.
11:15 AM - 11:40 AM
Evolved Approaches for Countering Adversaries
Morgan Adamski, Chief, Cybersecurity Collaboration Center,
NSA
Adam Meyers, SVP, Counter Adversary Operations,
CrowdStrike
Moderator: Cristian Rodriguez, CTO of the Americas,
CrowdStrike
The NSA’s Cybersecurity Collaboration Center (CCC) is about as familiar with
aggressive foreign adversary attacks as any organization can be. Join Morgan
Adamski, Director of the CCC, for a lively discussion with Adam Meyers, SVP,
CrowdStrike Counter Adversary Operations, on best practices and the evolved,
real-world, counter-adversary approaches the CCC’s industry, interagency and
international partners are taking to stop breaches.
11:40 AM - 12:05 PM
Leveraging AI for the Defenders Advantage
Eric Hysen, Chief AI Officer, DHS
Drew Bagley, VP Privacy & Cyber Policy, CrowdStrike
AI is poised to tip the balance of power in cyberspace, helping cyber
defenders better understand the threats facing their organizations, reduce
response time and automate mundane tasks. Join CrowdStrike’s Drew Bagley as
he sits down with Eric Hysen, Chief AI Officer for the Department of
Homeland Security (DHS), for a discussion on the ways DHS is taking
advantage of AI innovation and defending against threats within DHS and more
broadly across the Federal government.
12:05 PM - 12:30 PM
Cybersecurity is National Security: A Conversation with Senate
Intelligence Committee Chairman Mark Warner
Sen. Mark Warner, Chairman of the U.S. Senate Select
Committee on Intelligence
Shawn Henry, Chief Security Officer, CrowdStrike and former
Executive Assistant Director, FBI
Join CrowdStrike’s Chief Security Officer, Shawn Henry and U.S. Senator Mark
Warner for a closing session and fireside chat on strengthening
our collective national cybersecurity posture. Following the session, join
Shawn, our speakers, CrowdStrike experts, threat hunters, and your peers in
the Hub for lunch, networking, and more learning.
12:30 PM - 3:30 PM
Lunch, Networking, Demos, Expert Bar & Customer Appreciation
Reception
After the sessions break, grab lunch and explore the Hub together with your
team. Connect with experts, peers, CrowdStrike and sponsors at demo
stations, at the expert bar, at sponsor kiosks and in theater lightning
sessions for conversations across: Counter-Adversary Operations & Threat
Intelligence; Zero Trust; Next Gen SIEM; Identity Protection; Compliance;
Cloud Security; AI; Exposure Management and more.
Falcon for IT: Today's IT environments are burdened with
fragmented point products and flawed tools, amplifying the workload for your
teams. Falcon for IT enables you to gain fresh asset insights and execute
comprehensive IT, security, and compliance workflows, all with a single
agent and in a unified console.
Next Gen SIEM: 7 minutes. That’s how long it takes for
an adversary to break out and move laterally in your environment. Watch this
session to find out how you stay ahead of adversaries with CrowdStrike
Next-Gen SIEM. You'll discover how you can collect logs at petabyte scale
and investigate threats quickly with blazing-fast search. Join us to see the
latest capabilities we've introduced to solve your toughest SIEM
challenges.
Cloud Security: CrowdStrike Falcon Cloud Security goes
beyond ad-hoc approaches by unifying everything you need for cloud security
in a single platform to deliver comprehensive protection from the host to
the cloud and everywhere in between.
Identity Protection: Adversaries have evolved with 8 out of
10 attacks involving stolen or compromised credentials and 112% increase in
access broker ads on the dark web. It allows them to stay under the radar
and move laterally undetected. Learn how CrowdStrike's unique approach of
combining identity and endpoint telemetry enables customers to detect these
modern identity-driven attacks and stop them in real-time.
It's your last chance for Hub Lightning Sessions. For session titles and descriptions, read more...
1:30 PM - 2:30 PM
Hands-On Workshops:
Workshops get you hands-on with CrowdStrike technology and help your team
discover new ways to protect your organization in a rapidly evolving threat
landscape. Bring your laptop and get ready to learn from CrowdStrike
technical instructors! Pre-registration is required; limited
capacity.
Choose from:
1. Advanced Threat Hunting: Powered by
Threat Intelligence
2. Securing the Identity Landscape with
CrowdStrike
Advanced Threat Hunting: Powered by Threat
Intelligence
This hands-on workshop allows participants to identify threats from beyond
the perimeter. We’ll assume the role of an airline company and see how an
attack could play out. The story begins by detecting an attack and pivoting
to CrowdStrike Threat Intelligence. From there, we search the deep web and
dark web for signs of our sensitive data in the hands of malicious actors,
such as an access broker. Finally, we’ll continuously monitor these corners
of the web for any further signs of compromise.
Securing the Identity Landscape with
CrowdStrike
80% of
attacks today involve compromised credentials - does your agency have the
capabilities to stop the malicious use of valid credentials? In this
workshop, you'll learn how CrowdStrike Falcon Identity Protection gives you
actionable visibility into your identity landscape, detection of all forms
of identity based threats and flexible protection to stop breaches in
real-time.
For workshop descriptions and details, read more...
2:30 PM - 2:45 PM
Break
2:45 PM - 3:45 PM
Hands-On Workshops:
Workshops get you hands-on with CrowdStrike technology and help your team
discover new ways to protect your organization in a rapidly evolving threat
landscape. Bring your laptop and get ready to learn from CrowdStrike
technical instructors! Pre-registration is required; limited
capacity.
Choose from:
1. Advanced Threat Hunting: Hunt Across
the Stack
2. Securing Cloud Native Applications
(CNAPP) with Falcon Cloud Security
Advanced Threat Hunting: Hunt Across the
Stack
7 minutes. That’s how long it takes for an adversary to break out and move
laterally in your environment. Join our hands-on workshop to learn how you
can detect, investigate and stop adversaries with CrowdStrike Falcon
LogScale. Work with a number of popular data sources and discover how to
address top Next-Gen SIEM use cases. Lab scenarios include threat hunting,
forensics investigations and compliance.
Securing Cloud Native Applications (CNAPP) with Falcon
Cloud Security
This workshop shows how a unified CNAPP is a required component for your
agency’s digital transformation. Get hands-on with comprehensive protection
across the application lifecycle including protecting against
cloud-conscious adversaries. Attendees will learn efficient practices to
avert, identify, and counteract cloud-based threats faster than the
adversary. The workshop will spotlight Falcon Cloud Security’s abilities to:
Prevent cloud attacks by identifying and mitigating risk from
misconfigurations and identity entitlements; detect real-time threats
including lateral movement; and hunt effectively through cloud detection and
response tools.
For workshop descriptions and details, read more...
4:00 PM - 5:00 PM
Adversary Underground – Gov Edition: The Dark Side of AI & Cyber
Proliferation
Adam Meyers, SVP, Counter Adversary Operations,
CrowdStrike
Moderator: Cristian Rodriguez, CTO of the Americas,
CrowdStrike
Hot off of the heels of the 2024 Global Threat Report, join CrowdStrike
threat hunting OGs to hear secret stories of adversary encounters,
unfathomable predicaments, and how cybersecurity heroes stop breaches.